首页> 外文OA文献 >Hidden credential retrieval from a reusable password\ud
【2h】

Hidden credential retrieval from a reusable password\ud

机译:从可重复使用的密码中隐藏凭证检索\ ud

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access keys and tokens in a connected world. Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password, and are helpful against only a subset of the possible attackers. After briefly reviewing a variety of approaches, we propose a user-centric comprehensive model to capture the possible threats posed by online and offline attackers, from the outside and the inside, against the security of both the plaintext and the password. We then propose a few very simple protocols, adapted from the Ford-Kaliski server-assisted password generator and the Boldyreva unique blind signature in particular, that provide the best protection against all kinds of threats, for all distributions of secrets. We also quantify the concrete security of our approach in terms of online and offline password guesses made by outsiders and insiders, in the random-oracle model. The main contribution of this paper lies not in the technical novelty of the proposed solution, but in the identification of the problem and its model. Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion that requires no change to protocols or infrastructure.
机译:我们重新审视了访问凭证管理这一古老的问题,该问题涉及内存有限的人类为了保护互联世界中的各种访问密钥和令牌而必须采用的技术。尽管可以使用许多现有解决方案来使用短密码来保护长秘密,但是这些解决方案通常需要对秘密和/或密码的分布进行某些假设,并且仅针对可能的攻击者的一部分。在简要回顾了各种方法之后,我们提出了一种以用户为中心的综合模型,以捕获明文和密码的安全性,从外部和内部捕获在线和离线攻击者可能构成的威胁。然后,我们提出了一些非常简单的协议,这些协议是从Ford-Kaliski服务器辅助密码生成器,尤其是Boldyreva独特的盲签名中改编而成的,它们为机密的所有分发提供了针对各种威胁的最佳保护。在随机预言模型中,我们还根据外部人员和内部人员进行的在线和离线密码猜测来量化我们方法的具体安全性。本文的主要贡献不在于所提出的解决方案的技术新颖性,而在于对问题及其模型的识别。我们的结果在现实世界中具有直接和实际的应用:它们显示了如何以临时的用户驱动方式实现互联网的单点登录无状态漫游身份验证,而无需更改协议或基础结构。

著录项

  • 作者

    Boyen, Xavier;

  • 作者单位
  • 年度 2009
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号